This article describes a hypothetical breach of computer security. It describes how easily a corporate computer system may be accessed, both by unauthorized internal personnel and by an outside “hacker.” The results of such a breach may be disastrous. And it may be surprising how easily these breaches can be accomplished. Suggestions for preventing these types of problems are provided.
Download "Information Security–A Critical Business Function"
This content is only available to IVT members.
Get help maintaining your knowledge in Computer & Software Validation. Read More!
If you are already a member and you do not have access to this article, upgrade your membership.
Need help? Read our FAQs.
This product has been added to your shopping cart. You can
continue shopping or proceed to
checkout.